Cellebrite asks cops to keep its phone hacking tech ‘hush hush’ | TechCrunch::For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite to unlock phones and In a leaked video, a Cellebrite employee urges law enforcement customers to keep their use of its phone hacking technology secret.
This is a most excellent place for technology news and articles.
I like this part…
They’ll do their best to keep this out of the courtroom. This is a spying tool for parallel construction and espionage (corporate, political, etc) and they do not want to get called onto the stand under oath to testify about it.
Yes they will, and it will work. It’s not like this is the first time fascists built tools for other fascists to use on the public illegally, then once it came to light the tired, sick, worked to death population did exactly what they were conditioned to do, nothing, because they can’t, they have no power, because they have been drained by corporate fascists so they have no recourse, no say in anything, it’s just go back to work to make sure you’re not eating out of garbage cans by next month.
The public is apathetic, but it’s by design, if you don’t already know about Edward Bernays then I suggest looking him up and finding out how they control the public. This however feels vary familiar, there was a scandal in the 90s about Stingray devices being used illegally by guess who… fascist cops doing what the fascist propaganda taught them their whole life, get those “criminals” anyway you can, even if you have to become the highest order of criminal scum to do so, all those cop shows conditioned those fascists just right (no pun intended.) In other words this is just business as usual. Here’s a link to Wikipedia about Stingray devices if you’re interested. https://en.m.wikipedia.org/wiki/Stingray_use_in_United_States_law_enforcement
Anyone know what Cellebrite can hack these days? I thought many of the latest phones and software versions had closed their vulnerabilities. Does anyone have data on which phones and OS versions are still vulnerable?
I very briefly worked for one of their competitors a few years back. These devices are pretty much limited to whatever you can do with root on android or jailbreaking iOS. If a person has a modern phone and a good sense of op-sec, chances are they can’t get much. These things basically work by doing backups then analyzing those backups offline, searching in known locations for non-encrypted databases and images. On android they can also do things through adb, like automated screenshots.
If you hand the cops a powered off non-rooted,locked bootloader, non-jailbroken phone and use e.g. signal, there’s not much they’ll be able to see. Of course, there seem to be other firms that operate at a higher level, and have some encryption breaking capabilities, but that’s not going to be accessible to your average cop.